GB2116808A - Randomized tag to monitoring station communication system - Google Patents

Randomized tag to monitoring station communication system Download PDF

Info

Publication number
GB2116808A
GB2116808A GB08305854A GB8305854A GB2116808A GB 2116808 A GB2116808 A GB 2116808A GB 08305854 A GB08305854 A GB 08305854A GB 8305854 A GB8305854 A GB 8305854A GB 2116808 A GB2116808 A GB 2116808A
Authority
GB
United Kingdom
Prior art keywords
signal
code pattern
tag circuit
clme
tag
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
GB08305854A
Other versions
GB2116808B (en
GB8305854D0 (en
Inventor
Raymond L Barrett
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sensormatic Electronics Corp
Original Assignee
Sensormatic Electronics Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sensormatic Electronics Corp filed Critical Sensormatic Electronics Corp
Publication of GB8305854D0 publication Critical patent/GB8305854D0/en
Publication of GB2116808A publication Critical patent/GB2116808A/en
Application granted granted Critical
Publication of GB2116808B publication Critical patent/GB2116808B/en
Expired legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10009Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
    • G06K7/10019Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves resolving collision on the communication channels between simultaneously or concurrently interrogated record carriers.
    • G06K7/10029Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves resolving collision on the communication channels between simultaneously or concurrently interrogated record carriers. the collision being resolved in the time domain, e.g. using binary tree search or RFID responses allocated to a random time slot
    • G06K7/10059Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves resolving collision on the communication channels between simultaneously or concurrently interrogated record carriers. the collision being resolved in the time domain, e.g. using binary tree search or RFID responses allocated to a random time slot transponder driven
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/0008General problems related to the reading of electronic memory record carriers, independent of its reading method, e.g. power transfer
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/28Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence

Description

.DTD:
1 GB2 116808A 1 .DTD:
SPECIFICATION .DTD:
Randomized tag to monitoring station communication system The present invention relates to a communication system and more particularly to a system for detecting and identifying one or more of a plurality of independent tag circuits whenever such circuits come within range of a monitoring station. It also relates to the tag circuits per se.
.DTD:
There exist numerous applications for a communication system capable of keeping track of the coming and going and whereabouts of a particular object, whether it be animate or inanimate. Previously, systems have been developed for keeping track of vehicles where the vehicles travel compara20 tively known paths past fixed installations. For example, in United States Patent Specification No. 3,859,624 there is described an interrogator-responder arrangement which employs a responder tag that receives power as the vehicle carrying it approaches the interrogator unit. The power is received through inductive coupling and the responder tag is stated to generate a coded information field unique to the particular responder tag. The coded infor30 mation field is received by the interrogator and converted to an information signal representative of the tag. Where the tag is selfpowered, the interrogator means does not generate an AC power field and the inductive coupling between tag and interrogator is limited to the coded information field. The responder tag either operates continuously if self-energized, or operates whenever it re- ceives transmitted power from an interrogator station. The system utilizes digital techniques and employs a message format for response that consists of 32 bits, the first seven of which represents a synchronization pattern.
.DTD:
This is followed by a parity bit and then six 45 groups of 4 bits each in binary coded decimal form providing a 6-digit identification number. The responder tag is held to the barest essentials and only the interrogator is provided with means for validating the signal received from 50 the other.
.DTD:
Responder tags have also been used as part of a credential system for identifying authorized personnel and monitoring passage into or out of a controlled area. A system for that purpose is described in a project report entitled "The Self-Energized Credential System for the Plutonium Protection System" by Thurlow W. H. Caffey and David E. Barnes available from the U.S. Department of Energy, P.O. Box 62, Oak Ridge, Tennessee 37830 under document No. SAND78-2156, printed December 1978. In this system a portal loop transmits a continuous tone at 110 KHz, and the credential transmits an identification code in bursts of a 55 KHz tone. The 55 KHz tone burst is amplified, converted to binary form in the decoder, and tested to see if certain format and parity conditions are met. If the binary code is validated, it is made available 70 for transmission to an operations centre. The particular code format incorporates a group of four hexadecimal digits grouped as two pairs with three sync bits and a parity bit added to each pair. The entire code word is 24 bits long. The first digit in each hexadecimal pair is fixed as 1 and O, respectively, so that the first hexadecimal digit is always eight or greater and the third hexadecimal digit does not exceed seven. Because of this coding BO format and the method used for validation, the number of unambiguous available codes is only 16,192 out of a possible 65,536.
.DTD:
Neither of the systems mentioned above is able to handle the simultaneous passage of 85 more than one responder tag past an interro- gator point. This limitation can be tolerated in situations where it is either natural or expected that passage past the control point will be in single file. However, there are many situations where a monitoring function is desired with minimum, if any, intrusion on the normal movement of the carrier. For example, in a hospital it would be extremely useful to be able to know at all times the whereabouts 95 of doctors, nurses and other personnel to facilitate communcation with any desired individual. Another purpose of knowing the whereabouts of personnel might be for record purposes to be able to establish when particu- lar personnel were in attendance upon a particular patient or were in an operating room or the pharmacy. The number of uses are limited only by the imagination.
.DTD:
However, where such a system is to be used for documenting whereabouts or for important control it is essential that it reliably detect responder tags passing a monitoring station even though more than one tag might come within range of the station at the same time. The present invention provides just such a system. Moreover, as will appear from the ensuing description, the system in its present embodiment provides for monitoring 65,536 tags through a plurality of portals. It will reliably handle up to 6 tags simultaneously through any one portal.
.DTD:
According to a first aspect of the present invention there is provided a communication system for detecting whenever one or more of 120 a plurality of independent tag circuits comes within range of a monitoring station and identifying such tag circuits as come within said range even though more than one tag circuit may come within said range at the same time, 125 said system including: means located at said monitoring station for radiating an interrogating signal containing a first code pattern identifiable with said monitoring station; a tag circuit containing means for receiving said interrogating signal whenever said tag circuit 2 GB 2 116 808A 2 is within range of said monitoring station, and means for responding to said interrogating signal, said last mentioned means comprising means for radiating a series of response sig- nals each containing a predetermined second code pattern different from said first code pattern and identifiable with said tag circuit, and means for varying in at least a pseudoran- dora manner the intervals between successive response signals; means located at said monitoring station for receiving and testing any signals that are within range of said station to determine if such last mentioned signals con- tain a predetermined code pattern identifiable 15 with a tag, and only if such last mentioned code pattern is present, passing on said received signals to a processing unit.
.DTD:
According to a second aspect of the present invention there is provided a tag circuit for communicating with and furnishing identification to a monitoring station whenever said tag circuit comes within range of said monitoring station and independent of the simultaneous presence within said range of another tag circuit, said tag circuit comprising means for receiving from said monitoring station an interrogating signal containing a first code pattern when in range of said station, and means for responding to said interrogating signal, said last mentioned means comprising means for radiating a series of response signals each containing a predetermined second code pattern different from said first code pattern and identifiable with said tag circuit, and means 35 for varying in at least a pseudorandom man- ner the intervals between successive response signals.
.DTD:
The present invention will now be described in greater detail by way of example with reference to the accompanying drawings, in which:Figure 1 is a diagrammatic view illustrating the environment within which the present invention may be utilized; Figure 2 is a block diagram illustrating the basic components utilized in the system embodying the present invention; Figure 3 is a block diagram of the interro- gating transmitter portion of the portal interro50 gating transmitter and receiver unit of Fig. 2; Figure 4 is a block diagram of the interrogating receiver portion of the portal interrogating transmitter and receiver unit of Fig. 2; Figure 5 is a block diagram of the circuit 55 incorporated in the identification tag of the system illustrated in Fig. 2; Figure 6 is a schematic logic circuit diagram of the components illustrated in Fig. 3; Figure 7 is a series of waveform diagrams 60 which assist in describing the operation of the equipment; Figures 8A and 8B constitute a schematic logic circuit diagram of the components illus- trated in the receiver portion of the system 65 shown in Fig. 5; Figures 9A and 9B constitute a schematic logic circuit diagram of the components illustrated in the transmitter portion of the system shown in Fig. 5; Figures 10A and lOB constitute a schematic logic circuit diagram of the components illustrated in Fig. 4; and Figure 11 is a waveform diagram illustrat- ing the initial portion of the signal transmis75 sion from two separate tags and the response engendered in the portal receiver.
.DTD:
Referring to Fig. 1 there is shown a floor plan representing a room 10 having a doorway 11 opening on a corridor 12. This is merely an arbitrary example for purpose of illustration. It may be assumed that the room 10 is in a hospital, perhaps an operating room, and that it is desired to have a continu- ous record of when and who has entered or 85 left the room. Two doctors 13 and 14 are about to enter the room 10 almost simultaneously. They could just as well be approaching the doorway 11 from opposite directions, one entering the room 10 as the other is leaving.
.DTD:
Located adjacent the doorway 11 is a portal unit 15. As will be explained in greater detail hereinafter, the portal unit 15 is coupled to a magnetic loop, not shown in Fig. 1, but associated with the doorway 11. Each of the doctors 13 and 14 carries a small identification tag, to be described in detail below but not shown in Fig. 1, that interacts with the portal unit 15 through magnetic coupling to the doorway magnetic loop. The portal unit 15 and its associated portal loop may be considered a monitoring station.
.DTD:
The present invention relates to the system for establishing reliable communication be- tween the portal unit and the identification 105 tags, and does not include the downstream apparatus that utilizes the information accumulated by the portal unit. Therefore, to avoid undue complexity, the simplest situation has been assumed for purpose of illustration. It is assumed that whenever an identification tag enters the range of the portal unit 15, the former passes through the doorway. Hence, if we know at any point in time the location of everyone being tracked, an unambiguous sig- nal can be obtained indicative that the particular identification tag has been carried into the room if it was previously known to be in the corridor or was carried out of the room into the corridor if it was known to have been in 120 the room.
.DTD:
The basic components of the system are shown in Fig. 2. The portal unit 15 includes an interrogating transmitter and receiver that communicates with a plurality of identification 125 tags bearing the same reference numerals as the individuals by whom they are carried. The information derived by the portal unit 15 is relayed over an output 16 to an information utilization station. This has not been shown but may be an interface unit to a central - 3 GB2 116 808A 3 processor or the central processor itself.
.DTD:
The portal unit 15 includes a transmitting section shown in block form in Fig. 3 and in detail in Fig. 6 which produces a periodic interrogation signal spaced by intervals of quiet during which the associated receiver section listens for any tag responses. The receiver section is shown in block form in Fig.
4 and in detail in Figs. 10A and 10B. Each 10 identification tag of Fig. 2 includes a circuit shown in block form in Fig. 5 and in detail in Figs. 8A, 8B, 9A and 9B.
.DTD:
Referring to Fig. 3, it will be seen that the transmitting section of the portal unit contains 15 a crystal controlled clock 17 producing a carrier signal, e.g. at a frequency of 25.6 KHz, that is fed through a gate 18 in a bisphase mark modulator or Manchester modulator 19 to a low- pass filter and power amplifier 20. The output from the filter and amplifier 20 is fed through a switch 21 when the latter is conducting or closed circuited to a portal loop 22. The loop 22 would be installed, for example, around the door frame of the door- way in Fig. 11 and arranged to radiate energy to produce a magnetic field within the immediate vicinity of the doorway 11 for interacting with a receiving coil on any identification tags that might come within range of the field produced by the loop 22.
.DTD:
The clock signal output from clock 17 is also furnished to a divider/bisphase generator 23 where it is divided by 32 and split in phase to provide two pulse trains. It is an oversimplification to view the output signals from the generator 23 as simply phase shifted versions of a true frequency divided signal. As will be evident from the detailed circuit shown in Fig. 6, the 25.6 KHz clock output is divided by two and is then scaled down in a binary counter to produce pulses having a duration equal to two complete cycles of the 25.6 KHz signal, i.e. a time duration of 78.125/Sec. The latter pulses repeat at a 45 pulse repetition rate of 800 pps with the pulses in one output, say phase 1, occurring 0.625 mSec from those in the phase 2 output. The signal output from bi-phase generator 23 that has arbitrarily been designated as G1 is fed both to a timer 24 and to another gate 25 in the modulator 19. The second phase output 02 from generator 23 is fed to an identification code generator 26 that is also furnished with an output from timer 24.
.DTD:
The code generator 26 is clocked by the signal from generator 23 and sequenced by the timer output to produce a signal fed over output 27 to control the gate 25 whose output is fed to a switched divider 28. When the switched divider 28 is enabled by a signal from timer 24 over output 29, the divider feeds a signal from gate 25 divided by two to the gate 18. Collectively the gates 18 and 25 and divider 28 constitute a bi-phase mark modulator passing a pulse modulated carrier signal from clock 17 to filter amplifier 20. At the same time the enabling signal from timer 24 on output 29 is applied to switch 21 to render it conducting thereby passing the modulated signal to portal loop 22.
.DTD:
While the transmitting section is sending out an interrogating signal it is desired that the receiving station disconnected from the portal loop 22, shared in common, and this function is accomplished by feeding the signal from timer output 29 through an inverter 30 to another switch 31 so as to render the latter non-conducting. As shown, the input to switch 31 is obtained from the junction 32 80 with the portal loop 22 and is fed to a receiver preamplifier AGC and filter circuit 81 shown in Fig. 4.
.DTD:
Before describing the receiver section of the portal unit it may be helpful to consider the 85 portal transmitting section in greater detail, then consider the construction and operation of the tag circuits, followed by a consideration of the portal receiving section. Communication between the identification tags and the portal unit occurs at a frequency of 25.6 KHz with an interrogate-response format. As noted above with reference to Fig. 3, information is modulated onto the 25.6 KHz carrier fre- quency utilizing self-clocking bi-phase mark 95 modulation. Interrogate information occurs at a rate of 800 bits per second, with a message length of six bits. The first three bits follow a fixed pattern of 110, and the remaining three bits are used to provide a facility identifier to 100 the tags, the three bits providing for eight different code patterns. Utilizing a bi-phase mark format, the interrogate patterns will appear as shown in Fig. 7. As will be explained hereinafter, the interrogate sequence occupies 105 a time period of 7.5 mSec0 Any identification tag within range of the portal unit will receive the information from the portal unit contained in the interrogate sequence. The tag circuit will check for the proper frequency, the pro110 per bit rate, the preamble sequence of 110, and for the 3-bit facility identifier to which it is preprogrammed before it assumes that it must respond. Response information returning from an identification tag to the portal unit occurs at a rate of 1600 bits per second, with a message length of 28 bits. The first four bits follow a fixed pattern of 1110, the next 16 bits indicate the identity of the tag, the next 6 bits contain an error checking code, 120 and the last 2 bits are presently reserved and contain 00. The portal unit receives the information from an identification tag, checks for the proper frequency, the proper bit rate, the preamble sequency of 1110, then effects a 125 preliminary acceptance of the identifier, error checking code and following O0 pattern.
.DTD:
The format for a tag response is also shown in Fig. 7 on the first line thereof. The format involves a preamble transmission of 2.5 mSec 130 duration, a tag identification transmission of 4 GB2 116 808A 4 10mSec duration, an error correction code occupying 5 mSec followed by a 1.25 mSec pause. These time intervals along with a pretransmission format pause of 0.625 mSec provides an overall time slot interval or duration of 19.375 mSec. There are 32 such time slots in one complete tag transmission cycle for a total time of 620 mSec. To this is added a post time delay of 11.5625 mSec and a pre-response pause of 0.9375 mSec making up a complete cycle of 632.5 mSec.
.DTD:
Referring now to Fig. 6, it will be seen that the crystal controlled clock 17 consists of a conventional crystal controlled oscillator pro15 viding a pulse output at terminal 33. This signal is fed directly over a lead 34 to one input of the NOR gate 18. The signal at terminal 33 is also fed to the clock terminal of a D flip-flop 35, connected as shown, within the bi-phase generator 23. The flip-flop 35 divides by 2 the signal obtained from the clock 17. Thus, an output signal from the Q output of flip-flop 35 is fed to the clock input of a binary counter 36. The Q0 through Q3 output terminals of the counter 36 are connected, as shown, to the inputs of the two NOR gates 37 and 38. NOR gate 37 has its output connected through lead 39 to one input of the gate 25. Another lead 40 con30 nects the output from gate 37 to the clock input terminal of a binary counter 41 in the timer 24. Counter 41 has its QO to Q2 outputs connected, respectively, to the A, B, and C inputs of an 8-channel data selector 42. The X inputs to the data selector are used to set up the preamble and identification codes for the facility. As shown in Fig. 6, the Xl and X2 inputs are connected to a voltage source representing a high or logical 1 condi- tion. The X3 terminal is connected to a vol- tage representing the logical O condition while terminals X4, X5 and X6 are connected to individual selector switches 43, 44 and 45 which enable the identification code for the 45 portal unit to be preselected to one of the eight alternatives indicated in Fig. 7. It will be understood that when the switches 43, 44 and 45 are in the open position as shown in the drawing each of the terminals to which they are connected are equivalently connected to the logical 0 level. If it is desired to connect the particular input terminal of the data selector to a logical 1 value, its respec- tive switch should be closed connecting it to 55 the positive voltage source. The XO and X7 terminals are provided for introducing a guard interval or space both before and after the code pattern in order to insure against certain types of interference. These terminals are shown connected to the low voltage or logical 0 value.
.DTD:
The data selector 42 is also provided with an inhibit input terminal to which is connected over lead 46 the output from a NAND gate 65 47 whose input is connected together and to the output from NOR gate 38. NAND gate 47 inverts the output from NOR gate 38 inhibiting the data selector 42 except for the brief interval during which an output pulse is de70 rived from the second phase 2 of the bi- phase generator 23. At such instance, the Z output terminal of the data selector is connected to whichever input terminal is deter- mined by the binary signals applied to its ABC 75 input terminals from the counter 41. These signals are applied over lead 27 to the other input of gate 25.
.DTD:
The output from NOR gate 25 is fed to the clock input of a D flip-flop constituting the switch divider 28. The D flip-flop 28 is connected as shown with its ( output connected both to its D input and to an input of NOR gate 18. The reset terminal of the D flip-flop 28 is connected to the output 29 from the timer 24 which output is derived from a NOR gate 48. NOR gate 48 functions as an inverter having both of its inputs connected together and to the output from a multiple input NOR gate 49. Six of the inputs to NOR gate 49 are coupled, respectively, to the Q1 to Q6 outputs of the 7-stage ripple counter 50. The reset terminal of said counter is connected to earth while the clock input is connected over leads 51 and 52 to the Q2 outputs of counter 41. Since the Q2 output of counter 41 will alter its condition once for every eight input pulses received at its clock terminal from the output 39 of the bi-phase generator 23, the signal applied to the ripple counter 50 will represent the signal out of gate 37 divided by eight.
.DTD:
One further input to NOR gate 49 is derived from the output of a NOR gate 53 whose three inputs are connected to the three outputs of counter 41. The same three outputs of counter 41 are connected through respective inverters 54, 55 and 56 to the three inputs of a further NOR gate 57. The output of NOR gate 57 is connected to one 110 further input of NOR gate 49.
.DTD:
The four-digit numbers appended to the various logic circuit components shown in Fig. 6 represent the CMOS type numbers and, thereby, completely identify the parts in ques- tiono It is believed that those persons skilled in the art will now be able to understand the complete operation of the portal transmitter section described with reference to Fig. 6. It is observed that the switched divider 28 is 120 inhibited from operating so long as its reset terminal has a logical 1 applied to it over lead 29. This will occur anytime any one of the inputs to the NOR gate 49 contain a logical 1 signal. Analysis of the circuit will show that when it operates from a 25.6 KHz clock the transmission window for the 6- bit code will occupy an interval of 7.5 mSec. while the silent time will occupy an interval of 632.5 mSec. It is during the latter interval that a 130 signal is applied through inverter 30 to switch GB2116808A 5 31 in Fig. 3 for rendering it conductive to enable the receiver circuit illustrated in Fig. 4 to operate. Whether or not an identification tag comes within range of a given portal unit, 5 the portal unit will continue to transmit periodically an interrogation signal and then listen for a reply. If any reply occurs during the listening interval it will be verified and recorded. If no reply is heard the operation will 10 nevertheless continue.
.DTD:
The identification tags for use with the present system are small, battery operated, solid state circuit devices having their own antenna loops for coupling to the portal loops.
.DTD:
Referring to Fig. 5, the circuit contained in an identification tag is illustrated in block diagram form. It contains a tag loop 60 operative both for reception and transmission whose terminals are connected for reception to a preamplifier and filter circuit 61 whose output feeds a carrier envelope detector 62. The output of the carrier envelope detector is passed through a low-pass filter 63 to a transition detector 64. From transition detec- tor 64 a detected output is fed via a lead 65 to a clock and data separator 66 whose output is then fed to an interrogation sequence recognition circuit 67. The output from the interrogation sequence recognition 30 circuit 67 is fed to a junction 68 where it is connected through lead 69 to an input to gate circuit 70 and through a lead 71 back to the clock and data separator 66. Junction 66 is also connected through a lead 72 to an inver- ter 73 and thence to an input of each of the circuits 62, 63, 64 and 66. Finally, the junction 68 is connected over through lead 74 to an input to a frame counter 75 and a timer 76.
.DTD:
A crystal controlled clock 77 having a frequency of 25.6 KHz has an output coupled through lead 78 to the gate 70 for providing the switched clock signal on leads 79 and 80.
.DTD:
The switched clock signal on lead 79 is fed both to the interrogation sequence recognition circuit 67 and to the carrier envelope detector 62. The switched clock signal on lead 80 is connected to each of the circuits 62, 63 and 64. In addition, the clock 77 has a direct output connected from lead 78 to the timer 76, the clock and data separator 66, a Manchester modulator 83, and a bi-phase generator 84. The latter divides the signal from clock 77 by 16. The frame counter 75 has one output connected through lead 85 to the clock and date separator 66 and another output connected through lead 86 to an input to gate 87. The second input to gate 87 is derived over leads 88 and 88A from the timer 76. The output from gate 87 feeds an input to a pseudorandom binary sequence reply counter 89. The reply counter 89 also receives an input over a lead 90 from the timer 76 and an input through the lead 91 from the Manchester modulator 83. The output from the reply counter 89 is furnished to a junction 92 for connection to inputs to the Manchester modulator 83 and the timer 76. Timer 76 also provides an output through lead 93 to 70 the frame counter 75 and another output through lead 94 to a Hamming generator 95. The Hamming generator 95 has an additional input obtained from the output 01 of genera- tor 84 through the lead 96. Another circuit is 75 completed from timer 76 over an output 97 through an identification sequence generator 95. The output from sequence generator 98 is also connected through lead 99 to one input of a sequence control circuit 100. A second input to sequence control circuit 100 is derived through lead 101 from the Hamming generator 95. Finally, a third input to the sequence control circuit 100 is derived through lead 102 from the timer 76.
.DTD:
As further shown in Fig. 5 the output 01 from the bi-phase generator 84 is also connected through lead 103 to the Manchester modulator 83. The output)2 from the gener- ator 84 is connected through a lead 104 to 90 an input of the Manchester modulator 83.
.DTD:
Another input to the Manchester modulator 83 is derived through lead 105 from the sequence control circuit 100. The output from the Manchester modulator 83 is furnished 95 through lead 106 to the power amplifier driver 107 whose output is connected across the tag loop 60.
.DTD:
Having described the identification tag circuitry in general terms with reference to Fig.
5, attention should be directed to Figs. 8A, 8B, 9A and 9B for a more detailed explanation of the implementation of the functional components contained in the circuit of Fig. 5. Commencing with Figs. 8A and 8B the crystal controlled clock circuit 77 is shown as of conventional construction having a clock output 78. Signals received by the tag loop 60 (see Fig. 5) are coupled through the preamplifier and filter circuit 61 via a lead 110 to the set inputs of two D flip-flops 111 and 112 in the carrier envelope detector 62. As shown, the switched clocking signals on leads 79 and 80 are connected, respectively, to the clock inputs of flip-flops 112 and 111. In addition, the input 79 is connected to a clock input of a further D flip-flop 113 while the input 80 is connected to the clock input of another D flipflop 114. All of the reset terminals of flipflops 111, 112, 113 and 114 are connected over through 72A to the output of the inverter 73 in the interrogation sequence recognition circuit 67. The D inputs to flip-flops 111 and 112 are connected to logical 0 voltage levels while the Q output of flip-flop 111 is con-nected to the D input of flip-flop 113 and the Q output of flip-flop 112 is connected to the D input of flip-flop 114. The ( outputs from flipflops 113 and 114 are connected to the inputs of a NAND gate 115 whose output represents the output from the carrier envel- 6 GB2116808A 6 ope detector 62.
.DTD:
The low-pass filter 63 consists of a type 4175 quad type D flip-flop 116 and four NAND gates 117, 118, 119 and 120. The elements 116 to 120 are interconnected as shown in Fig. 8A. All of the clock inputs of the flip-flop components of the quad flip-flop 116 are connected to the switched clock line 80 while all of the reset terminals are con- nected to the output of an inverter 121 whose input is connected through lead 72A to the output of inverter 73. The output from NAND gate 119 constitutes the output from the low- pass filter 63 and it is fed to both the D input 15 of a D flip-flop 122 in the transition detector 64 and one input of an EXCLUSIVE OR gate 123. The clock input of flip- flop 122 is connected to the switched clock line 80 while its Q output is connected to the other input of 20 the EXCLUSIVE OR gate 123. The output from the gate 123 represents the output of the transition detector and is furnished over lead 65 to one input of a NAND gate 124.
.DTD:
The latter gate is located in the clock and data 25 separator 66.
.DTD:
The other input to the NAND gate 124 is obtained from the output of the interrogation sequence recognition circuit 67 through line 71A. The clock and data separator 66 also 30 contains a NOR gate 125, four D flip-flops 126, 127, 128 and 129, a type 4017 decade counter 130, NOR gates 131, 132, 133, 134, 135, 136 and 137, OR gates 138 and 139, and inverters 140 and 141. The various 35 components are interconnected as shown in Fig. 8B by conventional symbology.
.DTD:
The clock and data separator 66 has a series of output leads 142, 143, 144, 145 and 146 leading to the interrogation sequence recognition circuit 67. Lead 142 is coupled from the Q5 output of counter 130 to a D input of a D flip-flop 147. It is also connected to one input of a NAND gate 148. The lead 143 is connected from the Q output of flip45 flop 128 in clock and data separator 66 to the clock input of a binary counter 149. Lead 144 is coupled between the output of the NOR gate 131 and an input to the NOR gate 150. The second input to NOR gate 150 is obtained by lead 145 coupled to the output of gate 136. Lead 146 is coupled from the output of gate 137 to the input of a NOR gate 151 that is cross-coupled to another NOR gate 152, as shown. An inverter 153 interconnects the output of gate 150 with an input of gate 152. The output from counter 149 is coupled as shown in Fig. 8B to the two inputs of a NAND gate 154 and to the A, B and C inputs of a type 4051 analog multi- plexer/demultiplexer 155. The latter is an 8channel device whose output terminal X0 to X5 are connected to respective strapping terminals 156 for selective interconnection with a corresponding terminal in either of the sets 65 157 or 158. As shown, the strapping termi- nals 156 that are connected to outputs X0 and Xl of the device 155 arc connected to terminals in the set 158 while the output X2 is connected to a terminal in the set 157.
.DTD:
These represent fixed connections to predetermine the 110 preamble used as part of the portal identification sequence. It will be unde stood that the remaining strapping terminals that are connected to the output X3, X4 and X5 would be connected either to the set 157 or 158 depending upon the identification code used for the particular facility in which the identification tag is to be employed. The X6 terminal of the device 155 is connected to a logical 1 potential applying a blocking signal to one input of the NOR gate 159 after a 6bit interrogation signal from a portal has been recognized. The output form gate 159 is coupled to one input of the OR gate 138 in the clock and data separator which constitutes part of the reset section of the component 66. Discussion of the operation of the circuit described with reference to Figs. 8A and 8B will be deferred until the details of Figs. 9A and 90 9B have been considered.
.DTD:
Referring to Figs. 9A and 9B it will be seen that the divide by 16 biphase generator 84 consists of a binary counter 160 having its outputs coupled to a pair of NOR gates 161 95 and 162. The output from gate 161 is re- ferred to as ( while the output from gate 162 is referred to as (2. As shown, the output 0 is connected by lead 96 to the clock terminals of the individual flip-flop components in the type 4174 hex type D flip-flop 163 in the Hamming generator 95. As shown, all of the reset terminals of the flip-flops in component 163 are connected to the output of an inverter 164 whose input is fed over lead 94B coming 105 from the Q1 output of a type 4017 decade counter/divider 165 in timer 76. The Hamming generator 95 also includes five EXCLUSIVE OR gates 166, 167, 168, 169 and 170 and an AND gate 171, all connected as illustrated in Fig. 9A. The control input to EXCLUSIVE OR gate 170 is derived from junction 99 at the output of the identification sequence generator 98 while the control input for the AND gate 171 is derived through leads 94A and 94C from the Q2 output of the decade counter/divider 165.
.DTD:
The identification sequence generator 98 consists of two type 4051 8channel analog multiplexer/demultiplexer components 172 120 and 173. A set of pairs of terminals 174 to which straps or junpers can be connected are provided with one terminal of each pair connected to the respective XO to X7 output of the components 172 or 173 while the other terminals of each pair are joined together and connected to the logical 0 voltage level. An open circuit between any pair of the set of terminals 174 represents a logical 1 condition while a strap bridging a pair of terminals introduces a logical O condition. The control 7 GB 2 116 808A 7 inputs for the components 172 and 173 in the identification sequence generator 98 are obtained from the timer 76. Specifically, the timer 76 contains a type 4516 binary up/- down counter 175 whose QO to Q3 outputs are connected by cable 97, respectively, to the A, B, C, and inhibit terminals of the analog multiplexers 172 and 173 with the single exception that the connection to the inhibit terminal of multiplexer 172 is passed through an inverter 176. As is well known, four binary bits have the capacity of designating 16 different conditions and the inverter 176 provides for the multiplexer 172 cycling 15 during the first eight counts from the binary counter 175 while the multiplexer 173 cycles for the subsequent eight counts. Collectively, the multiplexers 172 and 173 provide for the sequential selection of 16 different bit values 20 to constitute an identification code.
.DTD:
The X outputs from the multiplexers 172 and 173 in the identification sequence generator 98 are connected together and to the junction 99 as well as through a resistor 177 25 via lead 94D to the junction between leads 94A and 94C.
.DTD:
The QO to Q3 outputs of the decade counter 165 in the timer 76 are connected through a series of OR gates 178, 179 and to the P0 to P3 inputs of the binary up/down counter 175. Both the carry in terminal and the up/down terminal of the counter 175 are tied to the logical 0 voltage level. This causes counter 175 to operate as a down counter. The preset enable or PE terminal of the counter 175 is connected to the ( output terminal of a D flip-flop 181. The Q output of flip-flop 181 is connected to the clock terminal of the counter 165 and to one of the inputs of a NAND gate 182. A second input to gate 182 is derived from lead 183 connected to the output of an OR gate 184. This lead 183 is also connected to the D input of flip-flop 181 and to an input to the NOR 45 gate 185.
.DTD:
One of the inputs to gate 184 is connected to the carry out, CO output of the counter 175 while the other input to the gate 184 is connected to the output of a NAND gate 186.
.DTD:
The clock terminal to the counter 175 is also connected to the output of gate 186. The inputs to gate 186 are obtained, one from the lead 103 and the other from the output of a NAND gate 187. The two inputs to the gate 187 are obtained, one from the lead 74 and the other from the Q4 output of counter 165. Lead 74 is also connected to the reset terminal of a type 4024 7-stage ripple counter 188 in the frame counter circuit 75. The clock terminal of said ripple counter 188 is con- nected to the lead 93 connected to the Q4 output of counter 165.
.DTD:
In the frame counter 75 the Q1 and Q6 output terminals of the ripple counter 188 are 65 connected to two of the inputs to a NAND gate 189 whose output passes through an inverter 190 to the output lead 85. The third input to gate 189 is obtained from the Q1 output of counter 165 in the timer 76. The Q6 output of the counter 188 in the frame counter 75 is also connected via lead 86 to the inverter 191 in the gate circuit 87. The output of inverter 191 is coupled to one input of an AND gate 192 whose second input is derived from a lead 88A coupled to the QO output of counter 165. The QO output of counter 165 is also connected through lead 88B to the set input of a D flip-flop 193 in the Manchester modulator 83. The remaining components constituting the timer circuit 76 consists of a D flip-flop 194 a NAND gate 195 and an AND gate 196 all connected as shown in Fig. 9B.
.DTD:
The Manchester modulator 83 includes an 85 inverter 196, NAND gates 198 and 199, NOR gates 200 and 201 and another inverter 202. These components are all interconnected as shown in Fig. 9B.
.DTD:
The pseudorandom binary sequence reply 90 counter 89 includes a type 4024 7-stage ripple counter 203 whose clock input is coupled to lead 91 coming from the output of the Manchester modulator 83 and whose Q5 out- put is connected to the clock input of three D 95 flip-flops 204, 205 and 206. The Q output terminals of the respective flip-flops 204, 205 and 206 are connected to the inputs of a NOR gate 207 whose output is connected to each of the set terminals of the flip-flops for 100 the purpose of inhibiting said flip-flop for simultaneously assuming the reset condition that would be equivalent to a binary count of zero. In addition, the Q outputs from the flip- flops 204 and 206 are connected to respec105 tive inputs of an EXCLUSIVE OR gate 208 whose output is coupled to the D input of flipflop 204. Thus, the three flip-flops 204, 205 and 206 are interconnected in a pseudorandom binary sequence counting arrangement.
.DTD:
For this particular example the counting sequence is 7, 6, 5, 2, 4, 1, 3. The next count is 7 and the sequence repeats ad infinitum. The reply counter also includes a type 4516 binary up/down counter 209 whose preset terminals PO, P1 and P2 are coupled to the Q outputs, respectively, of flip-flops 204, 205 and 206. The carry out terminal (CO)"of counter 209 is connected to the junction 92 from which connections are made to gate 201 120 and gate 185. The counter 209 also includes a preset enable (PE) terminal connected to the lead 90 from the Q output of flip-flop 194 in timer 76. The clock terminal of counter 209 is coupled to the output of gate 192 while the P3 preset terminal is connected to a logical O potential value.
.DTD:
The sequence control 100 includes NAND gates210, 211, 212and 213 as well as a NOR gate 214, all connected as shown in Fig. 130 9B.
.DTD:
8 GB2116808A 8 As described above with reference to Figs. 3 and 6, the portal unit periodically radiates an interrogation signal containing a 6-bit digi- tal identification code pattern. Whenever an 5 identification tag is within range of a portal unit its tag loop will pick up a signal that is fed to its preamplifier and filter 61. From there it proceeds to the carrier envelope detec- tor which converts the pulse train information 10 into a logic level output removing any signal transitions which occur more frequently than one half the tag's internal clock rate. The output from the carrier envelope detector 62 is a replica of the tone burst modulation envelope of the interrogation sequence. This modulation envelope is further processed in the low pass filter 63 which prevents transitions spaced less than four clock periods apart from propagating further. The output from the low-pass filter is then processed in the transition detector 64 to develop a pulse at each change in level of the modulation envelope. The output from the transition detector 64 passes to the gate 124 in the clock and data separator 66. The latter is a state counter with timing controlled to allow the pulse developed from the modulation envelope to propagate in one of three directions. The first pulse re- ceived following a period exceeding maximum timing tolerance is considered to be the first pulse of a new message, setting the valid message state. To understand what happens it is necessary to consider the state of the circuit just prior to the receipt of this pulse. The flip35 flop 129 is in its reset state with Q equal 1.
.DTD:
The counter 149 is reset, its Q outputs are all equal to logical O. Therefore, the junction 68 is at a logical 1. This enables gate 70, resets frame counter 75, and enables gate 124, carrier envelope detector 62, low-pass filter 63 and transition detector 64. The flip-flop 129 has a logical 0 applied to its D input. The output from transition detector 64 will be at a logical 0. Therefore, the output of gate 124 is 45 a logical 1 and the gate 125 output is a logical 0o Flip-flop 128 is set with ( equal O. Counter 130 is at a count of "9" with Q9 equal 1. Therefore, the inverter 141 applies an enabling logical 0to gate 131.
.DTD:
At the first change in the logic level from the low-pass filter 63 due to an incoming pulse the transition detector 64 will produce an output of logical 1. This causes the output from gate 124 to go to 0 causing flipflop 129 to be set through gate 131 and counter 130 to be reset through gate 125. When the pulse from gate 125 returns to 0 in response to the clock pulse going high, it clocks flipflop 128 to its "reset" state with Q equal 0 and ( equal 1.
.DTD:
Once counter 130 has been reset it immediately commences to count the internal clock pulses received via flip-flops 126 and 127 that divide the crystal clock frequence by a 65 factor of four. Any subsequent transition pulses delivered by the transition detector 64 within timing tolerances expected for a data clock transition are directed out of the clock and date separator 66 via gate 136. Any transition pulses received within timing tolerances expected for a data 1 transition are directed out of the circuit as a data pulse gate 137. Finally, any transition pulses received that are out of tolerance expected are directed 75 to reset the circuit in preparation for a new message. If such occurrences coincide with counter 130 applying an output to either of its terminals Q1, Q2, Q5 or A6, the reset pulse will be applied via gate 135 and gate 138 to the flip-flop 129. However, if the pulse coincides with a count of "9" or more the reset is accomplished by Q9 of counter 130 going to a logical 1 which clocks the flipflop 129 into its reset condition due to the fact that a logical 0 is applied to its D input.
.DTD:
In any case, even if a reset signal is applied to flip-flop 129 via gates 135 and 138 the counter 130 will continue to count to the count of "9" so as to apply an enabling signal to the gate 131 preparing it to receive the next incoming transition to set flip-flop 129. Flip-flop 128 will also be set via gate 139 thereby enabling gate 125 to pass a reset signal to the counter 130. Until the receipt by the counter 130 of such reset signal, the logical I at its Q9 output disables the counter from further counting operating by reason of its feedback connection to the clock enable (CE) terminal of the counter.
.DTD:
The separated data and data clock signals derived from the clock and data separator 66 are compared in the interrogation sequence recognition circuit 67 with a preset code pattern established by the strapping of contacts 156, 157 and 158 as previously explained. The incoming signal is compared bit by bit with the preset pattern. Counter 149 steps with each bit and sequences in turn the selector 155. Any differences between the received sequence and the preset sequence will cause a reset signal to be applied from the X output of multiplexer 155 through gates 159 and 138 to reset flip-flop 129 and counter 149. The initial starting condition is 115 then assumed and the response to the next received signal will follow the procedure previously explained.
.DTD:
If a valid 6-bit signal consisting of the 110 preamble and the preset last three bits is received, the counter 149 will be permitted to reach a count of "6" applying a logical 0 to junction 68 which accomplishes several functions. It is fed back to the clock enable input of counter 149 to inhibit further counting of 125 said counter. It also disables further passage of signals through the carrier envelope detector 62, the low-pass filter 63 and the transition detector 64 as well as disabling gate 124. In essence, this signal at junction 68 signifies the end of the receive mode of 9 GB2 116 808A 9 operation and the commencement of the transmit mode.
.DTD:
Referring to Figs. 9A and 9B it will be seen that the logical O signal on conductor 74 will 5 remove the reset input from counter 188 of the frame counter 75 enabling counter 188 to commence operation. In addition, gate 187 now applies an enabling signal to gate 186 such that clocking signals from bi-phase gen- erator 84 furnished over connection 103 will be applied to the clock terminal of counter 175 that is connected to operate as a DOWN counter. It can be demonstrated that while the receiving portion of the tag circuit is in the 15 receiving mode the counter 165 will be in a condition applying a logical I output to its Q4 terminal. Therefore, since there is a logical 1 on conductor 74 during the receive mode operation, the gate 187 will have a logical 0 20 output disabling gate 186 and barring clock pulses to the DOWN counter 175. This condition is reversed as soon as a logical 0 appears on conductor 74.
.DTD:
Whenever DOWN counter 175 reaches a zero count its carry out (CO) output will produce a logical O output signal that enables gate 184 to output a O. This enables flip-flop 181 to be reset with d equal 1, enabling the preset enable of counter 175 permitting it to read in the next number from the counter 165 appearing at its input terminals PO to P3. When the counter 175 is thus set to some numerical value other than zero it will cause its (CO) terminal to output a 1. This returns 35 the output of gate 184toa 1. On the next positive clock pulse on lead 78 the flip-flop 181 will be restored with Q equal 1 and Q equal O. The logical 1 on its Q output will clock counter 165 to its next count. The distribution of signals from the counter 165 to the preset inputs of counter 175 is such that when the QO output of counter 165 is high, counter 175 will be set for 3 counts; when the Q1 output of counter 165 is high, counter will be set for 15 counts; when Q2 of counter 165 is high, counter 175 will be set for 7 counts; when Q3 of counter 165 is high, counter 175 will be set for 1 count while when Q4 of counter 165 is high, coun- tar 175 is set for 0 count.
.DTD:
The operation of the timer is such that the first 0.625 mSec provides a delay during which no transmission occurs. The next timer interval with QO of counter 165 being high 55 provides for an interval of 2.5 mSec. This corresponds to a duration of four bits permitting the transmission of the preamble pattern of 1110. During the next interval of the timer there is provision for an interval of 10 mSec 60 corresponding to the transmission time for sixteen bits. During this interval the counter 175 is sequenced to select the sixteen different bits programmed into the identification sequence generator 98. The bits from the sequence generator 98 are fed through gates and 171 into the Hamming generator 95 as well as via lead 99A and through gates 210 and 213 to the Manchester modulator 83.
.DTD:
During the next timer interval of 5 mSec duration data from the Hamming generator 95 is shifted out through gates 211 and 213 to control gate 198 in the modulator 83.
.DTD:
Each complete response consisting of all states of the timer 76 is defined as a frame with the number of the frame in process accumulated in the frame counter circuit 75. Thirty two frames are allowed and during frame thirty three a pulse is generated return80 ing the tag from its transmit mode to its receive mode.
.DTD:
Although the Manchester modulator is modulated during every frame it does not provide a modulated carrier output during each frame because the carrier is also gated by the output signal on lead 92 from the pseudorandom binary sequence reply counter 89. The reply counter section consisting of counter 209 is a DOWN counter which decre- ments on each cycle of the timer 76 except after frame 32. The carrier is passed to the Manchester modulator output only during the zero state of the DOWN counter 209. When- ever the Manchester modulator 83 is feeding an output signal to lead 106 it is also passing clocking signals back to the ripple counter 203 in the reply counter 89. The counter 203 divides the signal received from the output of modulator 83 by a factor of sixty four before 100 producing a signal to sequence the pseudo- random binary sequence circuit consisting of flip-flops 204, 205 and 206. At the end of any frame in which the reply counter is in its zero state the reply counter is reloaded with a random number from the flip-flops 204, 205 and 206 constituting the pseudorandom binary sequence generator.
.DTD:
Referring back to Fig. 5, although not shown, it will be understood that when the tag circuit is in the receiving mode the power amplifier driver 107 will have a high impedance so as not to load down the tag loop 60.
.DTD:
Referring now to Figs. IOA and lOB there is shown therein the details of the receiver section located at the portal unit 15. Certain stages of the circuit in the portal receiving section are identical in construction and operation to those contained in the tag circuit, particularly that described with reference to Fig. 8A. These are shown merely in block form in Fig. 10A. Additional similarity exists and to the extent that the components are the same and function in a similar manner they are designated by the same reference numer- als to which have been added a "-1". For example the carrier envelope detector 62-1 in Fig. IOA is identical to the carrier envelope detector 62 in Fig. 8A. Thus, if any signals are received by the portal receiver section 130 while it is in its receiving mode with switch GB2 116808A 10 31 conductive, such incoming signals will be tested and converted to transition pulses by the carrier envelope detector 62-1, the lowpass filter 63-1 and the transition detector 64-1. The output from the latter will then be furnished over conductor 65- 1 to one input of gate 124-1. The other input of gate 124-1 is coupled to the output of an inverter 300 whose input is connected to a junction 301, the further connections of which will be described below.
.DTD:
The portal receiver in Fig. lOB has a clock and data separator 302 which is almost identical to the clock and data separator 66 de- scribed with reference to Fig. 8B. The primary difference resides in the circuitry feeding the clock input of decade counter/divider 130-1. As shown in Fig. lOB the clock input of decate device 130-1 is connected to the ( 20 output of a D flip-flop 303 whose D and terminals are joined together to constitute a frequency divider. The clock input of flip-f_ 303 is furnished with a clocking signal CLK from lead 304 coupled back to the output of an inverter 305 in Fig. IOA whose input is connected to the clock output 78-1 of the crystal controlled clock 77-1. Consequently, whereas the clocking frequency supplied to the decade counter/divider 130 in the circuit of Fig. 8B was divided by four the comparable clocking frequency in the circuit of Fig. 10B is divided only by two. The reason for this should be self-evident since the baud rate of the identification tag transmitter is twice that 35 of the portal transmitter. The lower baud rate of the portal transmitter results from the additional flip-flop 35 interposed between the clock 17 and binary counter 36 in the portal transmitter illustrated in Fig. 6.
.DTD:
One other difference between the clock and data separator 302 of the portal receiver and that of the tag receiver is that in the former the gate 138-1 instead of having one of its inputs connected to the output of the frame counter now has such input connected over lead 306 to the output of a processing unit (P.U.) 307. The lead 306 is also connected through a resistor 308 to the logical 0 potential level. Therefore, in the absence of a logical 1 output from the processing unit 307, the lead 306 will be brought to a logical 0 value. This will shift to a logical 1 value when the processing unit puts out a logical 1 vol- tage level. In all other respects the clock and data separator 302 is the same as and functions in the same manner as the clock and data separator 66.
.DTD:
Assuming that proper clock and data pulses are received they are passed on by the separa- tor 302 to the identification sequence recognition circuit 309. The circuit 309 has a number of identical component parts to those found in the interrogation sequence recognition circuit 67 shown in Fig. 8B. To the extent that they are identical, such compo- nents are identified by the same reference numerals followed by a "-1". In order that the identifications sequence recognition circuit 309 can test the signal incoming from a presumed identification tag there is provided a circuit for comparing on a bit by bit basis the first four bits or preamble received from a possible tag. This is accomplished by the combination of a type 4017 decade counter/75 divider 310 having its Q0 to Q3 outputs connected respectively to the control inputs of the four sections, 311, 312, 313 and 314 of a type 4016 quad analog switch. The "In" terminals of switch sections 311, 312 and 313 are connection together and to the output of the gate 152-1. The input to switch section 314 is connected to the output of gate 151-1. The outputs of all of the switch elements 311 to 314 are connected together and through a resistor 315 to the logical 1 potential level. The junction between resistor 315 and the switch outputs is connected to one of the inputs of gate 159-1. The reset terminal of counter 310 is coupled to the d 90 output of flip-flop 129-1 in the clock and data separator 302. The clock enable (CE) terminal of the counter 310 is connected to its own Q4 output as well as to an output lead- 316 coupled to an inverter 317 in the 24-bit shift register 318. The latter consists of three type 4015 dual 4-bit static shift registers connected in tandem as shown in the drawings. The data or D input to the first 4-bit register 319 is connected through lead 320 to the output of gate 152-1 in the identification sequence recognition circuit 309. All of the clock inputs of the shift register units in register 318 are connected together and to the lead 143-1 connected to the Q output of 105 flip-flop 128-1 in the clock and data separa- tor 302. All of the reset terminals of the shift registers in register 318 are connected together and to the output of the inverter 317.
.DTD:
All of the Q outputs from the shift register units in register 318 are connected for parallel transfer via cable 321 to the processing unit 307. The latter unit will be provided with appropriate buffers and registers in known manner to receive the coded message previ115 ously shifted into register 318 for subsequent processing.
.DTD:
In order to time the incoming message on a bit by bit basis there is provided a 24-bit counter 322 composed of two type 4022 octalcounter/divider circuits 323 and 324. The counter 323 has its carry out terminal coupled to the clock terminal of counter 324. Thus counter 323 passes every eighth pulse to the counter 324. The latter, in turn, has its Q3 output connected to the junction 301. In this manner, the counters 323 and 324 furnish an output pulse for every 24 input pulses. The reset terminals of the counters 323 and 324 are connected to the output of inverter 317 so that 24-bit counter 322 is 11 GB2116808A 11 reset at the same time that the 24-bit shift register 318 is reset. As shown, the clock enable terminals of counters 323 and 324 are tied to the logical 0 potential level. This maintains such circuits in enabled condition for counting whenever their reset terminals are not furnished with a reset signal.
.DTD:
The junction 301 that is fed with signal output from the 24-bit counter 322 is con- nected both to an input of the processing unit 307 and to the components previously described as connected to the junctions 301. This is all clearly shown in Fig. 10B.
.DTD:
For convenience in visualizing the operation 15 of the receiver section of the portal unit refer- ence may also be had to the block diagram of Fig. 4 that carries the same numerals found in Figs. 10A and 10B. Operation of the remainder of the portal receiver will be as follows.
.DTD:
The first four valid pulses received will be compared on a bit by bit basis in the identification sequence recognition circuit 309 to see whether or not they follow the 1110 pattern that constitutes a fixed identification of an identification tag forming a part of the overall system. If the incoming signal meets this particular requirement, counter 310 will reach a count of "4" placing a logical 1 on its Q4 output which inhibits further counting opera30 tion of the counter 310 by reason of the feedback connection to its CE input. The Q4 output also functions through inverter 317 to remove the reset signal from the registers in shift register 318 and from the counters in counter 322. Thus, if 24 additional valid bits are received they will be shifted sequentially into the shift register 318 and counted by the 24- bit counter 322. After receipt of the 24th bit the counter 322 will produce a logical 1 40 output that signals the processing unit to accept the signals from the cable 321 transferring the same from register 318.
.DTD:
At the same time, the signal at junction 301 will block gates 124-1 and 70-1, and reset carrier envelope detector 62-1, low-pass filter 63-1, and transistion detector 64-1. Further signal reception that might interfere with transfer of the complete message in shift register 318 to the processing unit 307 will 50 be blocked until the processing unit 307 completes acceptance of such message over cable 321. Once this function is completed the processing unit 307 will furnish a logical 1 output to lead 306 causing a reset signal to be applied through gate 138-1 to the flip-flop 129-1. This will function to reset counter 310 causing its Q4 output to return to a logical 0 and thereby resetting the shift regis- ter 318 and counter 322. This will now cause 60 the signal at junction 301 to return to a logical 0 level restoring the components of the portal receiver shown in Figs. 10A and 10B to the receiving mode. Further reception of successive messages from identification tags 65 will be accomplished for the duration of the receiving mode time interval established by timer 24. It will be understood that during this receiving interval the portal receiver may receive identification signals from more than 70 one tag but since these will occur during different randomly selected intervals depending upon the output of the pseudorandom generator in the respective tag, the majority of such signals will not interfere with one another. As mentioned previously, during each complete transmission cycle from a tag there are 32 possible time slots during which an identification signal can be transmitted. Of these 32 time slots, for a given tag, only at least four and generally not more than eight time slots will be occupied. Since all of the tags are synchronized with a portal interrogation signal their respective transmission preiods will commence approximately at the same time. The likelihood that the transmissions from each tag will occur during different time slots has extremely high probability, at least for several responses from each. Bearing in mind that each identification tag has a unique identification signal pattern, the processing unit 307 in the portal receiver can identify and associate each set of received signals with a particular tag. Further validation by the processing unit can be accomplished 95 as desired.
.DTD:
Because of the random transmission, there will be instances when transmissions from more than one tag will occur at the same time. The nature of the signals utilized is such 100 that if the carrier signals from the tags are out-of-phase, the preambles will normally be lost either through complete cancellation or distortion with the signals not getting past the carrier envelope detector, low-pass filter, and 105 transition detector circuits in the portal re- ceiver. However, it is possible for the carrier signals from plural tags to be sufficiently in phase that the signals not only get past the transition detector but pass through the clock and data separator into the identification sequence recognition circuit 309. In the latter circuit the preamble, being the same from each tag, will pass the preamble test thereby enabling the shift register 318 to receive the 115 subsequent portion of the transmission. But, because the identification codes are different for each tag, a garbled identification, in the absence of an over-riding control, would be accepted by the register 318. The unique 120 circuitry in the portal receiver, however, bars such occurrence.
.DTD:
Referring to Fig. 11 there is illustrated a possible condition wherein reply transmissions from tags A and B occur simultaneously and with their respective preambles in phase. The identification codes, of which only the first few bits are illustrated, are assumed to be different. The summation of the signals from the two tags will be somewhat as shown on 130 the line designated (A + B). It will immediately 12 GB2116808A 12 be apparent that in the region where the codes differ there is a loss of clock signal. Thus, upon occurrence of the signal in the vicinity of the reference numeral 400, since the clock signal is suppressed, the counter 130-1 will reach a count of "9" with Q9 equal 1 which causes the circuit to reset thereby barring further reception until another validated preamble is received. Nevertheless, because of the randomly selected transmission intervals, the majority of the transmissions from each tag will be received as noted above.
.DTD:
For the purpose of recapitulation, the pre- sent invention contemplates the use of a particular digital code format for establishing communication between a portal unit or monitoring station and an identification tag. The encoding scheme used by the modulators herein is known as bi-phase mark coding also known as Manchester. Such coding is characterized by the fact that a logical 1 has a second transition in the middle of the bit cell and a logical 0 does not. Bi- phase mark coding is one of several keying formats that have the characteristic that if two different code patterns in that format are summed at least some of the self-contained clock rate transitions disappear. It is that characteristic 30 that is utilized as explained above to reject signals that are received simultaneously from more than one source.
.DTD:
Although only one portal unit has been shown in the drawings, it is to be understood that a given facility such as a hospital would have a plurality of portal units, these may number in the hundreds, and all would be interconnected with one or more central processing units, CPU, for accomplishing the ultimate record keeping and control function. Just as a portal unit can identify a tag, a central processing unit can identify a portal unit. Using any known multiplexing scheme, the CPU can sequentially extract stored infor45 mation from each portal processing unit. In this manner the CPU will obtain information as to the whereabouts of each identification tag.
.DTD:
At a portal unit, the portal transmitter con- tinuously emits an interrogation signal consisting of a preamble that is generically indicative to any identification tag receiving the same that such signal has eminated from a portal unit. In addition, the portal interrogation sig- nal includes a code indicator of the particular hospital or other facility in which it is installed. Only tags coded for that hospital or facility will respond to the interrogation.
.DTD:
All tags within range of such interrogation will test and validate the interrogation signal. If the signal is validated it will serve to synchronize the commencement of a response transmission during which a plurality of re- sponses, all identical for a given tag, will be 65 transmitted at randomly selected intervals dur- ing a transmission period. The example described herein provides for thirty two transmission time slots each having a duration of approximately 19.375 mSec. Obviously, the number of time slots could be altered depending upon the time available for communi- cation between portal and tag and the bit rte used. The bit rate can readily be changed by changing the crystal clock frequency. There- fore, it can be assumed that the system may have provision for the "'n'" time slots of "'t'" duration.
.DTD:
The tag circuit descried herein employs a pseudorandom sequence generator. While a 80 truly random source might be utilized, it has not been found to be necessary. However, it might be advantageous to provide for further scrambling of the 7-digit output from the pseudorandom generator to the reply counter.
.DTD:
The choice will depend upon the average number of responses desired within a single complete transmission cycle from a tag.
.DTD:
Each tag responds with a twenty-eight bit message consisting of a four bit fixed 1110 preamble designed to avoid confusion with a portal transmission and to serve as a generic identifier to the portal unit that a signal from a tag is being received. It also functions to synchronize the portal receiver for reception of the next twenty-four bits that contain the tag identification and an error checking code based upon the principles developed by Richard Hamming.
.DTD:
Although the subject invention has been described with reference to a system for establishing communication between a monitoring station and a plurality of tag circuits, it is to be understood that the principles have broader application. That is, they may be relied upon in a system for establishing simultaneous communication between an interrogating station and a plurality of transponder circuits where it is desired to interrogate all of said transponder circuits during the same time 110 interval. In such case the transponder circuits would correspond to the individual tag circuits and the interrogating station would correspond to the monitoring station.
.DTD:
It will be appreciated that there are many 115 equivalent solid state components that can accomplish the same function, and while discrete logic components have been used, the same circuitry or equivalent can be produced in integrated form by known techniques. In 120 fact, contemporary microcomputer chips can be programmed to accomplish the equivalent functions.
.DTD:
.CLME:

Claims (24)

CLAIMS .CLME:
1. A communication system for detecting whenever one or more of a plurality of independent tag circuits comes within range of a monitoring station and identifying such tag circuits as come within said range even though more than one tag circuit may come 13 GB2 116808A 13 within said range at the same time, said system including: means located at said monitoring station for radiating an interrogating signal containing a first code pattern identifia5 ble with said monitoring station; a tag circuit containing means for receiving said interrogating signal whenever said tag circuit is within range of said monitoring station, and means for responding to said interrogating signal, said last mentioned means comprising means for radiating a series of response signals each containing a predetermined second code pattern different from said first code pattern and identifiable with said tag circuit, and means 15 for varying in at least a pseudorandom man- ner the intervals between successive response signals; means located at said monitoring station for receiving and testing any signals that are within range of said station to determine if such last mentioned signals contain a predetermined code pattern identifiable with a tag, and only if such last mentioned code pattern is present, passing on said received signals to a processing unit.
.CLME:
2. A communication system according to claim 1, wherein said means for radiating an interrogating signal comprises a timing element for periodically enabling an interrogating signal radiation cycle followed by an interval of no signal radiation of sufficient duration to receive during said interval a plurality of said response signals from a tag.
.CLME:
3. A communication system according to claim 2, wherein said tag circuit includes means for establishing "n" time slots of "t" duration within which said response signals may be radiated, the number of response signals actually radiated during any signal complete cycle of operation being a function 40 of said pseudorandom intervals established during said complete cycle, and the said duration of said interval of no signal radiation by said means for radiating an interrogating signal is at least equal to (n x t).
.CLME:
4. A communication system according to claim 1 wherein said means for radiating a series of response signals comprises a source of carrier frequency signals and means for modulating said carrier signals with said series 50 of response signals; and said means for vary- ing the intervals between successive response signals comprises a pseudorandom binary sequence generator having a clock input coup- led to an output of said modulating means.
.CLME:
5. A communication system according to claim 4, wherein said means for varying the intervals between successive response signals further comprises a presettable binary down- counter, means coupling said down-counter to 60 said pseudorandom generator for presetting said down-counter to the then existing count in said pseudorandom generator whenever said down-counter reaches zero count, and means for clocking said down-counter once 65 for each of "n" time.slots within which a response signal might be radiated, and radiating a response signal during each of said time slots in which said down-counter reaches zero count.
.CLME:
6. A communication system according to claim 5, wherein said tag circuit includes means for establishing said "n" time slots, each of "t'" duration; and wherein the said duration of said interval of no signal radiation 75 by said means for radiating an interrogating signal is at least equal to (n X t).
.CLME:
7. A communication system according to claim 2, wherein said means for radiating an interrogating signal comprises means for pro80 ducing said first code pattern, said last men- tioned means being constructed and arranged to generate a code pattern consisting of a first preamble code pattern indicative generically of a signal from a monitoring station and a 85 first presettable code pattern identifying a particular monitoring station.
.CLME:
8. A communication system according to claim 7, wherein said means for radiating a series of response signal includes means con- structed and arranged to generate said second code pattern containing a second preamble code pattern different from said first preamble code pattern and indicative generically of a signal from a tag circuit and a second presettable code pattern uniquely identifying a particular tag circuit.
.CLME:
9. A communication system according to claim 1 wherein said tag circuit receiving means additionally includes, means for testing said interrogating signal to determine whether or not said first code pattern corresponds to a preset interrogation code pattern, and wherein said tag circuit responding means responds to said interrogating signal only if said testing 105 establishes such correspondence.
.CLME:
10. A tag circuit for communicating with and furnishing identification to a monitoring station whenever said tag circuit comes within range of said monitoring station and indepen- dent of the simultaneous presence within said range of another tag circuit, said tag circuit comprising means for receiving from said monitoring station an interrogating signal containing a first code pattern when in range of said station, and means for responding to said interrogating signal, said last mentioned means comprising means for radiating a series of response signals each containing a predet- ermined second code pattern different from 120 said first code pattern and identifiable with said tag circuit, and means for varying in at least a pseudorandom manner the intervals between successive response signals.
.CLME:
11. A tag circuit according to claim 10, further comprising means for establishing "n" time slots of "t" duration within which said response signals may be radiated, the number of response signals actually radiated during any single complete cycle of operation being a function of said pseudorandom intervals 14 GB2116808A 14 established during said complete cycle.
.CLME:
12. A tag circuit according to claim 10, wherein said means for radiating a series of response signals comprises a source of carrier frequency signals and means for modulating said carrier signals with said series of response signals; and said means for varying the intervals between successive response signals comprises a pseudorandom binary se- quence generator having a clock input coupled to an output of said modulating means.
.CLME:
13. A tag circuit according to claim 12, wherein said means for varying the intervals between successive response signals further comprises a presettable binary down-counter, means coupling said down- counter to said pseudorandom generator for presetting said down-counter to the then existing count in said pseudorandom generator whenever said down-counter reaches zero count, means for clocking said down-counter once for each of "'n'" time slots within which a response signal might be radiated, and radiating a response signal during each of said time slots in which 25 said down-counter reaches zero count.
.CLME:
14. A tag circuit according to claim 13 wherein said tag circuit includes means for establishing said "'n" time slots, each of "t" duration; and wherein the said duration of 30 said interval of no signal radiation by said means for radiating an interrogating signal is at least equal to (n X t).
.CLME:
15. A tag circuit according to claim 10, wherein said means for radiating a series of 35 response signals includes means constructed and arranged to generate a code pattern containing a preamble code pattern indicative generically of a signal from a tag circuit and a presettable code pattern uniquely identifying 40 the particular tag circuit.
.CLME:
16. A tag circuit according to claim 15, wherein said means for radiating a series of response signals further includes means for appending to each response signal an error 45 correcting code pattern related to said preset- table code pattern.
.CLME:
17. A tag circuit according to claim 16, wherein said means for appending an error correcting code pattern comprises a Hamming 50 generator.
.CLME:
18. A tag circuit according to claim 10, wherein said tag circuit receiving means additionally includes, means for testing said interrogating signal to determine whether or not said first code pattern corresponds to a preset interrogation code pattern, and wherein said tag circuit responding means responds to said interrogating signal only if said testing establishes such correspondence.
.CLME:
19. A communication system for detecting whenever one or more of a plurality of independent tag circuits comes within range of a monitoring station and identifying such tag circuits as come within said range even though more than one tag circuit may come within said range at the same time, said system including first means located at said monitoring station for radiating an interrogating signal identifiable with said monitoring station; a plurality of tag circuits each containing means for receiving said interrogating signal whenever the respective tag circuit is within range of said monitoring station, and means for responding to said interrogating signal, said last mentioned means comprising means for radiating a series of response signals each containing a predetermined code pattern identifiable with the respective tag circuit, and means for varying in at least a pseudorandom manner the intervals between the successive response signals from each tag circuit; and second means located at said monitoring station for receiving any signals that are within range of said station and rejecting any of said response signals that arrive at said monitoring station from one tag circuit at the same time as a response signal from another tag circuit.
.CLME:
20. A communication system according to claim 19, wherein said second means located at said monitoring station comprises means for timing the occurrence of code pattern transitions present in a received signal, and means responsive to said last mentioned means for rejecting any signals if said code pattern transitions fail to occur at predetermined timed intervals corresponding to a response signal clock rate.
.CLME:
21. A communication system for estab- lishing simultaneous communication between an interrogating station and a plurality of transponder circuits, said system including first means located at said interrogating sta- tion for transmitting an interrogating signal; a plurality of transponder circuits each containing means for receiving said interrogating signal, and means for responding to said interrogating signal, said last mentioned means comprising means for transmitting a series of response signals each containing a predetermined code pattern associated with the respective transponder circuit, said code pattern being based upon a keying format such that if two different code patterns are 115 summed at least some of the self-contained clock rate transitions disappear, and means for varying in at least a pseudorandom manner the intervals between the successive response signals from each transponder circuit; and 120 means located at said interrogating station for receiving any signals that are transmitted by a transponder circuit and rejecting any of said response signals that arrive at said interrogat- ing station from one transponder circuit at the 125 same time as a response signal from another transponder circuit.
.CLME:
22. A communication system according to claim 21, wherein said second means located at said interrogating station comprises means 130 for timing the occurrence of code pattern GB2 116 808A transitions present in a received signal, and means responsive to said last mentioned means for rejecting any signals if any of said self- contained clock rate transitions disappear.
.CLME:
23. A communication system constructed and arranged to operate substantially as herein described with reference to and as illustrated in the accompanying drawings.
.CLME:
24. A tag circuit constructed and arranged to operate substantially as herein described with reference to and as illustrated in the accompanying drawings.
.CLME:
Printed for Her Majesty's Stationery Office by Burgess Et Son (Abingdon) Ltd.--1983. Published at The Patent Office, 25 Southampton Buildings, London, WC2A lAY, from which copies may be obtained.
.CLME:
GB08305854A 1982-03-05 1983-03-03 Randomized tag to monitoring station communication system Expired GB2116808B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US06/354,156 US4471345A (en) 1982-03-05 1982-03-05 Randomized tag to portal communication system

Publications (3)

Publication Number Publication Date
GB8305854D0 GB8305854D0 (en) 1983-04-07
GB2116808A true GB2116808A (en) 1983-09-28
GB2116808B GB2116808B (en) 1986-10-22

Family

ID=23392089

Family Applications (1)

Application Number Title Priority Date Filing Date
GB08305854A Expired GB2116808B (en) 1982-03-05 1983-03-03 Randomized tag to monitoring station communication system

Country Status (15)

Country Link
US (1) US4471345A (en)
JP (1) JPS58162881A (en)
AR (1) AR231364A1 (en)
BE (1) BE895864A (en)
BR (1) BR8301091A (en)
CA (1) CA1211522A (en)
DE (1) DE3305685C2 (en)
ES (1) ES8407270A1 (en)
FR (1) FR2522829B1 (en)
GB (1) GB2116808B (en)
IE (1) IE830193L (en)
IT (2) IT8309358A1 (en)
MX (1) MX155097A (en)
NL (1) NL8300643A (en)
SE (1) SE456278B (en)

Cited By (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2141006A (en) * 1983-04-21 1984-12-05 Intellitech Corp A system for location indentification motion measurement and/or systematic counting analysis and control
GB2154396A (en) * 1984-02-16 1985-09-04 Sigma Security Inc Security tag detection system
EP0171433A1 (en) * 1984-02-15 1986-02-19 Identification Devices Inc Identification system and transponder therefor.
GB2164825A (en) * 1984-09-19 1986-03-26 Satellite Video Systems Ltd Coded transponder for identification system
GB2187317A (en) * 1986-02-25 1987-09-03 John Barr Ayton Security system
GB2193359A (en) * 1986-07-31 1988-02-03 Multitone Electronics Plc Area communication systems
FR2610430A1 (en) * 1987-02-03 1988-08-05 Toshiba Kk CONTACTLESS READ TYPE INTEGRATED CIRCUIT CARD WITH PRE-IMPROVEMENT FUNCTION
EP0285419A2 (en) * 1987-03-31 1988-10-05 Identec Limited Access control equipment
EP0306598A2 (en) * 1987-09-08 1989-03-15 Clifford Electronics, Inc. Electronically programmable remote control access systems
GB2234140A (en) * 1989-05-16 1991-01-23 Samsung Electronics Co Ltd Automatic vehicle location system
FR2656447A1 (en) * 1989-12-26 1991-06-28 Omega Electronics Sa MOBILE TIMING DEVICE.
EP0494114A2 (en) * 1991-01-04 1992-07-08 Btg International Limited Electronic identification system
FR2677135A1 (en) * 1991-05-28 1992-12-04 Commissariat Energie Atomique SYSTEM FOR AUTOMATICALLY IDENTIFYING OBJECTS OR INDIVIDUALS BY REMOTE INTERROGATION.
EP0583084A1 (en) * 1992-07-20 1994-02-16 Mitsubishi Denki Kabushiki Kaisha Non-contact IC card, non-contact IC card reader/writer and data transmission method
WO1997017667A1 (en) * 1995-11-09 1997-05-15 British Technology Group Limited Enhanced detection of multiple data transmissions
EP0777192A1 (en) 1995-12-01 1997-06-04 RAIMBAULT, Pierre Method for phase alignment of electronic cards, interrogation station and electronic card for its implementation
US5640003A (en) * 1994-07-26 1997-06-17 Matsushita Electric Industrial Co., Ltd. IC card device for managing system
US5726630A (en) * 1992-11-18 1998-03-10 British Technology Group Limited Detection of multiple articles
GB2319698A (en) * 1996-11-21 1998-05-27 Motorola Inc Interrogating a plurality of contactless data carriers
WO1998051143A1 (en) 1997-05-14 1998-11-19 Btg International Limited Voluntary milking
WO1999008471A3 (en) * 1997-08-08 1999-04-29 Bosch Gmbh Robert Method for operating a remote control, and remote control
GB2333623A (en) * 1998-01-24 1999-07-28 Plessey Telecomm Transaction system
US6661336B1 (en) 1997-05-14 2003-12-09 Btg International Limited Enhanced identification system

Families Citing this family (142)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4559529A (en) * 1983-06-29 1985-12-17 U.S. Currency Protection Corp. Antitheft system with digitally coded signal
US4862160A (en) * 1983-12-29 1989-08-29 Revlon, Inc. Item identification tag for rapid inventory data acquisition system
US4673932A (en) * 1983-12-29 1987-06-16 Revlon, Inc. Rapid inventory data acquistion system
USRE35364E (en) 1985-10-29 1996-10-29 The Chamberlain Group, Inc. Coding system for multiple transmitters and a single receiver for a garage door opener
US4835372A (en) * 1985-07-19 1989-05-30 Clincom Incorporated Patient care system
DE3787291T2 (en) * 1986-01-13 1994-04-21 Abbott Lab Method and device for storing and recovering electronic data.
JPH061512B2 (en) * 1986-03-03 1994-01-05 松下電工株式会社 Simultaneous identification system for multiple cards
US4746830A (en) * 1986-03-14 1988-05-24 Holland William R Electronic surveillance and identification
US4818998A (en) * 1986-03-31 1989-04-04 Lo-Jack Corporation Method of and system and apparatus for locating and/or tracking stolen or missing vehicles and the like
US4850009A (en) * 1986-05-12 1989-07-18 Clinicom Incorporated Portable handheld terminal including optical bar code reader and electromagnetic transceiver means for interactive wireless communication with a base communications station
US4857716A (en) * 1986-05-12 1989-08-15 Clinicom Incorporated Patient identification and verification system and method
HUT43774A (en) * 1986-05-15 1987-11-30 Koezponti Banyaszati Fejleszte Method and apparatus for automatic identification living beings and objects
US4798175A (en) * 1986-10-09 1989-01-17 Alfa-Laval Agri, Inc. Electronic identification system
US4736196A (en) * 1986-11-18 1988-04-05 Cost-Effective Monitoring Systems, Co. Electronic monitoring system
JP2517931B2 (en) * 1986-11-26 1996-07-24 松下電工株式会社 Data transmission method in mobile identification device
US4924210A (en) * 1987-03-17 1990-05-08 Omron Tateisi Electronics Company Method of controlling communication in an ID system
JPS63228852A (en) * 1987-03-17 1988-09-22 Omron Tateisi Electronics Co Communication control system for id system
US4837568A (en) * 1987-07-08 1989-06-06 Snaper Alvin A Remote access personnel identification and tracking system
US5027314A (en) * 1988-03-17 1991-06-25 United Manufacturing Co., Inc. Apparatus and method for position reporting
US4916441A (en) * 1988-09-19 1990-04-10 Clinicom Incorporated Portable handheld terminal
US5684828A (en) * 1988-12-09 1997-11-04 Dallas Semiconductor Corp. Wireless data module with two separate transmitter control outputs
NL8901659A (en) * 1989-06-30 1991-01-16 Nedap Nv MULTIPASS SYSTEM.
US5640151A (en) * 1990-06-15 1997-06-17 Texas Instruments Incorporated Communication system for communicating with tags
US5973613A (en) * 1990-06-15 1999-10-26 Raytheon Company Personal messaging system and method
FR2666187B1 (en) * 1990-08-24 1994-05-06 Philippe Michel DEVICE FOR REMOTE DIALOGUE BETWEEN A STATION AND ONE OR MORE PORTABLE OBJECTS.
US5191192A (en) * 1990-09-10 1993-03-02 Mitsubishi Denki Kabushiki Kaisha Non-contact type information card and communication system
EP0556277A1 (en) * 1990-11-06 1993-08-25 Westinghouse Electric Corporation Dual mode electronic identification system
GB2253291B (en) * 1991-02-26 1994-08-17 Kevin Bell Signalling apparatus
FR2674656B1 (en) * 1991-03-26 1993-05-28 Bruneau Edward AUTHORIZED ACTUATION DEVICE FOR SENTENCES OF AN INSTALLATION.
US5321753A (en) * 1991-07-08 1994-06-14 The United States Of America As Represented By The United States Department Of Energy Secure communication of static information by electronic means
US5994770A (en) * 1991-07-09 1999-11-30 Dallas Semiconductor Corporation Portable electronic data carrier
US5266925A (en) * 1991-09-30 1993-11-30 Westinghouse Electric Corp. Electronic identification tag interrogation method
DE4134922C1 (en) * 1991-10-23 1992-12-03 Anatoli 3013 Barsinghausen De Stobbe
JP2877594B2 (en) * 1991-11-14 1999-03-31 富士通株式会社 Visitor management system
GB9202831D0 (en) 1992-02-11 1992-03-25 Shanning Laser Systems Ltd Security tag
SG49786A1 (en) * 1993-11-02 1998-06-15 Nippondenso C Ltd Communication system
US5539394A (en) * 1994-03-16 1996-07-23 International Business Machines Corporation Time division multiplexed batch mode item identification system
US5848541A (en) * 1994-03-30 1998-12-15 Dallas Semiconductor Corporation Electrical/mechanical access control systems
US5831827A (en) * 1994-04-28 1998-11-03 Dallas Semiconductor Corporation Token shaped module for housing an electronic circuit
US5604343A (en) * 1994-05-24 1997-02-18 Dallas Semiconductor Corporation Secure storage of monetary equivalent data systems and processes
US5679944A (en) * 1994-06-15 1997-10-21 Dallas Semiconductor Corporation Portable electronic module having EPROM memory, systems and processes
JP3066452B2 (en) * 1994-09-12 2000-07-17 株式会社アルカディア Sound characteristic conversion device, sound / label association device, and methods thereof
WO1996008794A1 (en) * 1994-09-12 1996-03-21 Westinghouse Electric Corporation Security code identification circuit
US6249212B1 (en) * 1994-10-05 2001-06-19 Avid Marketing, Inc. Universal electronic identification tag
US5615130A (en) * 1994-12-14 1997-03-25 Dallas Semiconductor Corp. Systems and methods to gather, store and transfer information from electro/mechanical tools and instruments
AU4745296A (en) * 1994-12-29 1996-07-24 Stephen Dale Smith Identification system
US5708423A (en) * 1995-05-09 1998-01-13 Sensormatic Electronics Corporation Zone-Based asset tracking and control system
US5543780A (en) * 1995-06-16 1996-08-06 Secure Care Products, Inc. Monitoring tag with removal detection
US5661457A (en) * 1995-06-19 1997-08-26 Sensormatic Electronics Corporation Directional antenna configuration for asset tracking system
GB9512953D0 (en) * 1995-06-26 1995-08-30 Medestate Ltd Tag detection system
DE19523654A1 (en) * 1995-06-29 1997-01-02 Sel Alcatel Ag Fraud-proof equipment identification method
DE19528599C2 (en) * 1995-08-03 1999-05-27 Siemens Ag Method for controlling access from a terminal to mobile data carriers
US5625341A (en) * 1995-08-31 1997-04-29 Sensormatic Electronics Corporation Multi-bit EAS marker powered by interrogation signal in the eight MHz band
US5940006A (en) * 1995-12-12 1999-08-17 Lucent Technologies Inc. Enhanced uplink modulated backscatter system
US5732401A (en) * 1996-03-29 1998-03-24 Intellitecs International Ltd. Activity based cost tracking systems
US6058374A (en) * 1996-06-20 2000-05-02 Northrop Grumman Corporation Inventorying method and system for monitoring items using tags
US5768140A (en) * 1996-06-21 1998-06-16 Symbol Technologies, Inc. RF-interrogatable processing system
US6128549A (en) * 1996-06-21 2000-10-03 Symbol Technologies, Inc. RF interrogatable processing system
US6362737B1 (en) * 1998-06-02 2002-03-26 Rf Code, Inc. Object Identification system with adaptive transceivers and methods of operation
CN1233327A (en) * 1996-10-17 1999-10-27 准确定位公司 Article tracking system
US6812824B1 (en) 1996-10-17 2004-11-02 Rf Technologies, Inc. Method and apparatus combining a tracking system and a wireless communication system
DE19646153A1 (en) * 1996-11-08 1998-05-14 Siemens Nixdorf Inf Syst Shopping cart scanner
US6046683A (en) * 1996-12-31 2000-04-04 Lucent Technologies Inc. Modulated backscatter location system
US6184841B1 (en) 1996-12-31 2001-02-06 Lucent Technologies Inc. Antenna array in an RFID system
US6130623A (en) * 1996-12-31 2000-10-10 Lucent Technologies Inc. Encryption for modulated backscatter systems
US6456668B1 (en) 1996-12-31 2002-09-24 Lucent Technologies Inc. QPSK modulated backscatter system
US5952922A (en) * 1996-12-31 1999-09-14 Lucent Technologies Inc. In-building modulated backscatter system
US5784686A (en) * 1996-12-31 1998-07-21 Lucent Technologies Inc. IQ combiner technology in modulated backscatter system
US6243012B1 (en) 1996-12-31 2001-06-05 Lucent Technologies Inc. Inexpensive modulated backscatter reflector
US6570487B1 (en) 1997-01-24 2003-05-27 Axcess Inc. Distributed tag reader system and method
US6034603A (en) * 1997-01-24 2000-03-07 Axcess, Inc. Radio tag system and method with improved tag interference avoidance
US5914671A (en) * 1997-02-27 1999-06-22 Micron Communications, Inc. System and method for locating individuals and equipment, airline reservation system, communication system
US6014029A (en) * 1997-11-12 2000-01-11 Climonics Ltda Sensor for sensing changes in the permittivity of a medium in which it is disposed
US6002344A (en) * 1997-11-21 1999-12-14 Bandy; William R. System and method for electronic inventory
US7844505B1 (en) 1997-11-21 2010-11-30 Symbol Technologies, Inc. Automated real-time distributed tag reader network
US7035818B1 (en) 1997-11-21 2006-04-25 Symbol Technologies, Inc. System and method for electronic inventory
FR2776444B1 (en) * 1998-03-18 2000-05-26 Innovatron Electronique CONTACTLESS COMMUNICATION SYSTEM USING AN INDUCTION METHOD BETWEEN A TERMINAL AND PORTABLE OBJECTS, INCLUDING MEANS OF FUNCTIONAL TEST OF THE TERMINAL
GB2335573B (en) 1998-03-18 2000-03-15 Univ Singapore An RF transponder identification system and protocol
US6369709B1 (en) 1998-04-10 2002-04-09 3M Innovative Properties Company Terminal for libraries and the like
WO1999055028A1 (en) * 1998-04-21 1999-10-28 Thomson Multimedia Method for synchronisation in a communication network and implementing appliances
EP0957442B1 (en) * 1998-05-15 2002-01-23 EM Microelectronic-Marin SA Electronic identification system of a plurality of transponders
JP2002516499A (en) * 1998-05-15 2002-06-04 イーエム・ミクロエレクトロニク−マリン・エス アー Electronic system for identifying multiple transponders
JP3531477B2 (en) * 1998-06-05 2004-05-31 株式会社日立製作所 Contactless card communication method and integrated circuit used for the communication
AU762475B2 (en) 1998-08-14 2003-06-26 3M Innovative Properties Company Applications for radio frequency identification systems
CN100492388C (en) * 1998-08-14 2009-05-27 3M创新有限公司 Radio frequency identification system applications
GB2340692B (en) 1998-08-18 2002-12-11 Identec Ltd Transponder identification system
US6209111B1 (en) * 1998-11-09 2001-03-27 Microsoft Corporation Error correction on a mobile device
US6294953B1 (en) 1999-02-26 2001-09-25 Axcess, Inc. High sensitivity demodulator for a radio tag and method
DE19913366C2 (en) * 1999-03-24 2001-11-15 Siemens Ag Device for verifying the identity of a transmitter
US6400272B1 (en) * 1999-04-01 2002-06-04 Presto Technologies, Inc. Wireless transceiver for communicating with tags
US6611556B1 (en) 1999-05-21 2003-08-26 Steve J. Koerner Identification system for monitoring the presence/absence of members of a defined set
US7005985B1 (en) 1999-07-20 2006-02-28 Axcess, Inc. Radio frequency identification system and method
DE19938998B4 (en) * 1999-08-17 2008-01-17 Infineon Technologies Ag Method for operating chip cards
US6297734B1 (en) 1999-09-23 2001-10-02 Northrop Grumman Corporation Randomization of transmit time
JP2001088789A (en) 1999-09-24 2001-04-03 Yamaha Motor Co Ltd Burglary preventive device of small propulsion vessel
WO2001025571A1 (en) * 1999-10-04 2001-04-12 Siemens Automotive Corporation Sequencing control for vehicle access system
DE19949572B4 (en) * 1999-10-14 2006-02-16 Texas Instruments Deutschland Gmbh Method for identifying multiple transponders
JP2001136100A (en) * 1999-11-04 2001-05-18 Matsushita Electronics Industry Corp Information communication processing system
US7286158B1 (en) 1999-12-22 2007-10-23 Axcess International Inc. Method and system for providing integrated remote monitoring services
SE518382C2 (en) * 2000-01-18 2002-10-01 Leif Nyfelt Procedure for monitoring the movement of an individual in buildings and rooms
US6377203B1 (en) 2000-02-01 2002-04-23 3M Innovative Properties Company Collision arbitration method and apparatus for reading multiple radio frequency identification tags
AU2000237263A1 (en) * 2000-03-01 2001-09-12 Axcess Inc. Radio tag system and method with tag interference avoidance
US6369710B1 (en) 2000-03-27 2002-04-09 Lucent Technologies Inc. Wireless security system
US6373389B1 (en) * 2000-04-21 2002-04-16 Usm Systems, Ltd. Event driven information system
US7768546B1 (en) 2000-05-12 2010-08-03 Axcess International, Inc. Integrated security system and method
EP1168229A3 (en) 2000-06-16 2002-10-30 Secure Care Products, Inc. Apparatus and system for identifying infant-mother match
US7253717B2 (en) * 2000-11-29 2007-08-07 Mobile Technics Llc Method and system for communicating with and tracking RFID transponders
US6600418B2 (en) 2000-12-12 2003-07-29 3M Innovative Properties Company Object tracking and management system and method using radio-frequency identification tags
JP2002225799A (en) 2001-02-05 2002-08-14 Sanshin Ind Co Ltd Antitheft device for surface traveling ship
WO2002065380A2 (en) * 2001-02-12 2002-08-22 Matrics, Inc. Radio frequency identification architecture
WO2002073357A2 (en) * 2001-03-09 2002-09-19 Radianse, Inc. A system and method for performing object association using a location tracking system
SE523165C2 (en) * 2001-03-20 2004-03-30 Leif Nyfelt Procedure for monitoring an individual's movements in and around buildings, rooms and the like
US7588185B2 (en) 2001-06-07 2009-09-15 3M Innovative Properties Company RFID data collection and use
US6669089B2 (en) 2001-11-12 2003-12-30 3M Innovative Properties Co Radio frequency identification systems for asset tracking
US6825766B2 (en) 2001-12-21 2004-11-30 Genei Industries, Inc. Industrial data capture system including a choke point portal and tracking software for radio frequency identification of cargo
US7106245B2 (en) * 2002-01-22 2006-09-12 Bae Systems Information And Electronic Systems Integration Inc. Digital RF tag
US7443877B2 (en) * 2002-02-28 2008-10-28 Siemens Aktiengesellschaft Method for coding a sequence of data bits, in particular for transmission via an air interface
DE50301097D1 (en) * 2002-02-28 2005-10-06 Siemens Ag METHOD FOR CODING A SEQUENCE OF DATA BITS, IN PARTICULAR FOR TRANSMISSION THROUGH AN AIR INTERFACE
US7009496B2 (en) * 2002-04-01 2006-03-07 Symbol Technologies, Inc. Method and system for optimizing an interrogation of a tag population
GB0213724D0 (en) * 2002-06-14 2002-07-24 Turner Christopher G G Electronic identification system
US7760835B2 (en) 2002-10-02 2010-07-20 Battelle Memorial Institute Wireless communications devices, methods of processing a wireless communication signal, wireless communication synchronization methods and a radio frequency identification device communication method
CN100354874C (en) * 2002-10-25 2007-12-12 赛宝技术公司 Optimization of a binary tree traversal with secure communications
JP2004206371A (en) * 2002-12-25 2004-07-22 Renesas Technology Corp Semiconductor device
US7167094B2 (en) * 2003-01-31 2007-01-23 Secure Care Products, Inc. Systems and methods for providing secure environments
JP4125160B2 (en) * 2003-03-06 2008-07-30 キヤノン株式会社 Transmitter and receiver
ATE435467T1 (en) * 2003-12-19 2009-07-15 Nxp Bv SYNCHRONIZATION DURING ANTI-COLLISION
US7841120B2 (en) 2004-03-22 2010-11-30 Wilcox Industries Corp. Hand grip apparatus for firearm
US20060244598A1 (en) * 2005-04-29 2006-11-02 Impinj, Inc. Interference rejection in RFID tags
US7917088B2 (en) * 2004-04-13 2011-03-29 Impinj, Inc. Adaptable detection threshold for RFID tags and chips
DE102004041437B3 (en) * 2004-08-27 2006-03-09 Atmel Germany Gmbh Method for selecting one or more transponders
CA2603118A1 (en) * 2005-03-29 2006-10-05 Symbol Technologies, Inc. Smart radio frequency identification (rfid) items
DE602006004036D1 (en) * 2005-04-29 2009-01-15 Nxp Bv
US7728713B2 (en) * 2005-05-06 2010-06-01 Intelleflex Corporation Accurate persistent nodes
US7800503B2 (en) 2006-05-11 2010-09-21 Axcess International Inc. Radio frequency identification (RFID) tag antenna design
US8427282B2 (en) * 2008-07-15 2013-04-23 Zih Corp. Identification system
US8638194B2 (en) 2008-07-25 2014-01-28 Axcess International, Inc. Multiple radio frequency identification (RFID) tag wireless wide area network (WWAN) protocol
US10846497B2 (en) 2011-12-05 2020-11-24 Adasa Inc. Holonomic RFID reader
US10050330B2 (en) 2011-12-05 2018-08-14 Adasa Inc. Aerial inventory antenna
US9780435B2 (en) 2011-12-05 2017-10-03 Adasa Inc. Aerial inventory antenna
US10476130B2 (en) 2011-12-05 2019-11-12 Adasa Inc. Aerial inventory antenna
US11093722B2 (en) 2011-12-05 2021-08-17 Adasa Inc. Holonomic RFID reader
US9747480B2 (en) 2011-12-05 2017-08-29 Adasa Inc. RFID and robots for multichannel shopping

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA475417A (en) * 1951-07-17 Peter Scott Gerard Apparatus for treating sewage
US3859624A (en) * 1972-09-05 1975-01-07 Thomas A Kriofsky Inductively coupled transmitter-responder arrangement
DE2249670B2 (en) * 1972-10-11 1978-06-15 Licentia Patent-Verwaltungs-Gmbh, 6000 Frankfurt Arrangement for reducing the probability of a simultaneous occupancy of a transmission channel which can be evaluated at the receiving end or at least prevents undisturbed transmission
DE2351013B2 (en) * 1973-10-11 1977-08-25 Licentia Patent-Verwaltungs-Gmbh, 6000 Frankfurt MESSAGE TRANSMISSION SYSTEM
US4015259A (en) * 1975-05-21 1977-03-29 The United States Of America As Represented By The Secretary Of The Army Method and apparatus for interrogating and identifying fixed or moving targets
GB1577920A (en) * 1976-11-01 1980-10-29 Nedap Nv Detection plate for identification systems
DE2844453A1 (en) * 1978-10-12 1980-04-24 Bbc Brown Boveri & Cie Transmission system for remote-control signal-packets - reduces cycle times by having substations distribute transmissions over several interrogations
DE2919753A1 (en) * 1979-05-16 1980-11-27 Bbc Brown Boveri & Cie DEVICE FOR AUTOMATICALLY IDENTIFYING OBJECTS AND / OR LIVING BEINGS
DE2946942C2 (en) * 1979-11-21 1985-07-18 Brown, Boveri & Cie Ag, 6800 Mannheim Method for recognizing a large number of objects
DE3009179A1 (en) * 1980-03-11 1981-09-24 Brown, Boveri & Cie Ag, 6800 Mannheim METHOD AND DEVICE FOR GENERATING THE REPLY SIGNAL OF A DEVICE FOR AUTOMATICALLY IDENTIFYING OBJECTS AND / OR LIVING BEINGS

Cited By (48)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2141006A (en) * 1983-04-21 1984-12-05 Intellitech Corp A system for location indentification motion measurement and/or systematic counting analysis and control
EP0171433A1 (en) * 1984-02-15 1986-02-19 Identification Devices Inc Identification system and transponder therefor.
EP0171433A4 (en) * 1984-02-15 1988-01-07 Identification Devices Inc Identification system and transponder therefor.
GB2154396A (en) * 1984-02-16 1985-09-04 Sigma Security Inc Security tag detection system
GB2164825A (en) * 1984-09-19 1986-03-26 Satellite Video Systems Ltd Coded transponder for identification system
GB2187317A (en) * 1986-02-25 1987-09-03 John Barr Ayton Security system
GB2193359B (en) * 1986-07-31 1990-07-11 Multitone Electronics Plc Area communications systems
GB2193359A (en) * 1986-07-31 1988-02-03 Multitone Electronics Plc Area communication systems
FR2610430A1 (en) * 1987-02-03 1988-08-05 Toshiba Kk CONTACTLESS READ TYPE INTEGRATED CIRCUIT CARD WITH PRE-IMPROVEMENT FUNCTION
EP0285419A2 (en) * 1987-03-31 1988-10-05 Identec Limited Access control equipment
EP0285419A3 (en) * 1987-03-31 1989-08-16 Satellite Video Systems Ltd. Access control equipment
EP0306598A2 (en) * 1987-09-08 1989-03-15 Clifford Electronics, Inc. Electronically programmable remote control access systems
EP0306598A3 (en) * 1987-09-08 1989-08-23 Clifford Electronics, Inc. Electronically programmable remote control access systems
US5650774A (en) * 1987-09-08 1997-07-22 Clifford Electronics, Inc. Electronically programmable remote control access system
GB2234140B (en) * 1989-05-16 1993-10-27 Samsung Electronics Co Ltd Automatic vehicle location system
GB2234140A (en) * 1989-05-16 1991-01-23 Samsung Electronics Co Ltd Automatic vehicle location system
EP0435055A1 (en) * 1989-12-26 1991-07-03 Omega Electronics S.A. Time-measuring device for vehicles
FR2656447A1 (en) * 1989-12-26 1991-06-28 Omega Electronics Sa MOBILE TIMING DEVICE.
EP1262926A1 (en) * 1991-01-04 2002-12-04 Btg International Limited Electronic identification system
US5995017A (en) * 1991-01-04 1999-11-30 Btg International Limited Electronic identification system confirming valid code
EP0494114A3 (en) * 1991-01-04 1992-12-23 Csir Electronic identification system
EP0494114A2 (en) * 1991-01-04 1992-07-08 Btg International Limited Electronic identification system
US5966083A (en) * 1991-01-04 1999-10-12 Btg International Limited Electronic indentification system with transponder muting
EP0685825A2 (en) 1991-01-04 1995-12-06 Btg International Limited Electronic identification system
EP0685825A3 (en) * 1991-01-04 1996-01-31 British Tech Group Electronic identification system.
US5537105A (en) * 1991-01-04 1996-07-16 British Technology Group Limited Electronic identification system
US5528221A (en) * 1991-05-28 1996-06-18 Commissariat A L'energie Atomique Automatic identification system for objects or persons by remote interrogation
WO1992022040A1 (en) * 1991-05-28 1992-12-10 Commissariat A L'energie Atomique System for automatic identification of objects or individuals by remote interrogation
FR2677135A1 (en) * 1991-05-28 1992-12-04 Commissariat Energie Atomique SYSTEM FOR AUTOMATICALLY IDENTIFYING OBJECTS OR INDIVIDUALS BY REMOTE INTERROGATION.
EP0583084A1 (en) * 1992-07-20 1994-02-16 Mitsubishi Denki Kabushiki Kaisha Non-contact IC card, non-contact IC card reader/writer and data transmission method
US5619529A (en) * 1992-07-20 1997-04-08 Mitsubishi Denki Kabushiki Kaisha Non-contact IC card and non-contact IC card reader/writer
US5726630A (en) * 1992-11-18 1998-03-10 British Technology Group Limited Detection of multiple articles
US5640003A (en) * 1994-07-26 1997-06-17 Matsushita Electric Industrial Co., Ltd. IC card device for managing system
WO1997017667A1 (en) * 1995-11-09 1997-05-15 British Technology Group Limited Enhanced detection of multiple data transmissions
EP0777192A1 (en) 1995-12-01 1997-06-04 RAIMBAULT, Pierre Method for phase alignment of electronic cards, interrogation station and electronic card for its implementation
US5923251A (en) * 1995-12-01 1999-07-13 Pierre Raimbault Phase control method for electronic tags and station and tag implementing said method
GB2319698B (en) * 1996-11-21 2001-08-08 Motorola Inc Method for communicating with a plurality of contactless data carriers and contactless data carrier for use therein
GB2319698A (en) * 1996-11-21 1998-05-27 Motorola Inc Interrogating a plurality of contactless data carriers
US6354500B1 (en) 1996-11-21 2002-03-12 Atmel Research Method for communicating with a plurality of contactless data carriers and contactless data carrier for use therein
WO1998051143A1 (en) 1997-05-14 1998-11-19 Btg International Limited Voluntary milking
US6661336B1 (en) 1997-05-14 2003-12-09 Btg International Limited Enhanced identification system
US7053755B2 (en) 1997-05-14 2006-05-30 Zih Corp. Enhanced identification system
US8872631B2 (en) 1997-05-14 2014-10-28 Zih Corp. Enhanced identification system
US9607193B2 (en) 1997-05-14 2017-03-28 Zih Corp. Enhanced identification system
WO1999008471A3 (en) * 1997-08-08 1999-04-29 Bosch Gmbh Robert Method for operating a remote control, and remote control
US6633227B1 (en) 1997-08-08 2003-10-14 Robert Bosch Gmbh Method for operating a remote control, and remote control
GB2333623B (en) * 1998-01-24 2000-04-26 Plessey Telecomm Transaction system
GB2333623A (en) * 1998-01-24 1999-07-28 Plessey Telecomm Transaction system

Also Published As

Publication number Publication date
GB2116808B (en) 1986-10-22
FR2522829A1 (en) 1983-09-09
DE3305685C2 (en) 1995-10-19
DE3305685A1 (en) 1983-09-15
IT8309358A0 (en) 1983-03-04
SE8301199L (en) 1983-09-06
ES519769A0 (en) 1984-08-16
MX155097A (en) 1988-01-26
BR8301091A (en) 1983-11-22
IE830193L (en) 1983-09-05
FR2522829B1 (en) 1986-09-05
JPH032271B2 (en) 1991-01-14
AR231364A1 (en) 1984-10-31
US4471345A (en) 1984-09-11
CA1211522A (en) 1986-09-16
ES8407270A1 (en) 1984-08-16
GB8305854D0 (en) 1983-04-07
IT1198536B (en) 1988-12-21
SE456278B (en) 1988-09-19
SE8301199D0 (en) 1983-03-04
IT8309358A1 (en) 1984-09-01
JPS58162881A (en) 1983-09-27
BE895864A (en) 1983-05-30
NL8300643A (en) 1983-10-03

Similar Documents

Publication Publication Date Title
US4471345A (en) Randomized tag to portal communication system
US3986167A (en) Communication apparatus for communicating between a first and a second object
EP0420295B1 (en) An RF transponder for use in an automatic/remote instrument monitoring system
US4130874A (en) Load management terminal having plural selectable address formats for a power line communication system
US5411536A (en) Method and apparatus for communicating data between medical devices to improve detectability of errors
US4004097A (en) Automatic meter reading device
US5339073A (en) Access control equipment and method for using the same
US3656112A (en) Utility meter remote automatic reading system
EP0040544B1 (en) Coded information arrangement
US3735353A (en) Alarm transmission line security system utilizing pseudo random encoding
US4963853A (en) Simultaneous inbound multi-channel communication system using electricity distribution network
US4471356A (en) Signal message transmitting system for a succession of mobile units
IE60327B1 (en) "Multipurpose digital IC for communication and control network"
GB2259227A (en) Improvements in or relating to transponders
GB2085207A (en) Fail-safe decoder for digital track circuits
KR100689048B1 (en) Encoding/decoding system for coherent signal interference reduction
US3735351A (en) Remote station address verification using address conditioned encoding
EP0082690A1 (en) Transmitter/responder systems
CA1073127A (en) Clock gated digital data encoding circuit
GB1602307A (en) Security systems having remote terminals system for monitoring integrity of communication lines in
EP0513349A4 (en) Method and device for radio-navigational determinations using artificial earth-satellites
GB2180424A (en) Non-contact identification system
US3121215A (en) Self-checking pulse transmission technique
US4445175A (en) Supervisory remote control system employing pseudorandom sequence
US3686439A (en) Telephone-line installation for keeping a remote watch on premises

Legal Events

Date Code Title Description
PCNP Patent ceased through non-payment of renewal fee

Effective date: 20010303